Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware
Mar 13, 2023Ravie LakshmananCyber Threat / Social Engineering
Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer...
GitHub Announces Free Secret Scanning for All Public Repositories
Dec 16, 2022Ravie LakshmananSecure Coding / Code Hosting
GitHub on Thursday said it is making available its secret scanning service to all public repositories...
Accelerate Your Incident Response
Dec 23, 2022The Hacker NewsIncident Response / XDR Platform
Tis the season for security and IT teams to send out that company-wide email: "No,...
CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems
Mar 08, 2023Ravie LakshmananVulnerability / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited...
Mitigate the LastPass Attack Surface in Your Environment with this Free Tool
Jan 05, 2023The Hacker NewsPassword Management / IT Breach
The latest breach announced by LastPass is a major cause for concern to security stakeholders....
Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites
Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous...
YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader
Apr 18, 2023Ravie LakshmananThreat Intelligence / Cyber Risk
Cybersecurity researchers have detailed the inner workings of a highly evasive loader named "in2al5d p3in4er" (read:...
Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through Firewalls
Jan 09, 2023Ravie LakshmananNetwork Security / Supply Chain
In yet another campaign targeting the Python Package Index (PyPI) repository, six malicious packages have been...
Pay What You Want for This Collection of White Hat Hacking Courses
Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good reasons to get into white hat hacking. That said,...
Cyolo Product Overview: Secure Remote Access to All Environments
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cybercriminals no longer break into systems,...